Old-skool usernames in ssh attacks / 2015-02-18

2015-02-18 Old-skool usernames in ssh attacks
Attention: this item is more than 5 years old, links can be broken and information can have been updated.
Somebody dug up some 'hacking VMS' howto files I guess:
Feb 17 21:53:25 greenblatt sshd[8483]: Invalid user OPERATOR from 201.48.89.105
Feb 17 22:00:43 greenblatt sshd[9138]: Invalid user RSBCMON from 117.239.42.90
Feb 17 22:09:54 greenblatt sshd[9962]: Invalid user FIELD from 189.56.109.19
Feb 17 22:18:39 greenblatt sshd[10837]: Invalid user MANAGER from 203.76.136.147
Feb 17 22:35:21 greenblatt sshd[12290]: Invalid user SYSDBA from 117.253.182.184
Some of the old 'default accounts' from way back! HACKING VAX'S VMS. at textfiles.com

Tags: , ,

IPv6 check

Running test...
, reachable as koos+website@idefix.net. PGP encrypted e-mail preferred. PGP key 5BA9 368B E6F3 34E4 local copy PGP key 5BA9 368B E6F3 34E4 via keyservers

RSS
Meningen zijn die van mezelf, wat ik schrijf is beschermd door auteursrecht. Sommige publicaties bevatten een expliciete vermelding dat ze ongevraagd gedeeld mogen worden.
My opinions are my own, what I write is protected by copyrights. Some publications contain an explicit license statement which allows sharing without asking permission.
Other webprojects: Camp Wireless, wireless Internet access at campsites
This page generated by $Id: newsitem.cgi,v 1.62 2023/09/19 14:49:50 koos Exp $ in 0.009904 seconds.